{"id":728,"date":"2006-02-07T00:00:00","date_gmt":"2006-02-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/07\/sleeper-bugs-used-to-steal-e1m-in-france\/"},"modified":"2021-12-30T11:38:03","modified_gmt":"2021-12-30T11:38:03","slug":"sleeper-bugs-used-to-steal-e1m-in-france","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/07\/sleeper-bugs-used-to-steal-e1m-in-france\/","title":{"rendered":"&#8216;Sleeper bugs&#8217; used to steal \u20ac1m in France"},"content":{"rendered":"<p>Russian thieves have stolen more than \u00ac1m (\u00a3680,000) from personal bank accounts in France using &#8220;sleeper bugs&#8221; to infect computers.  Police say the virus is embedded in emails or websites and remains dormant until the user contacts their bank online.   When that happens, the bug becomes active and records passwords and bank codes which are then forwarded to the thieves.   They then use the information to check the victim has money in the bank before transferring funds to the accounts of third parties, known as mules, who may have agreed to allow money to pass through their accounts in return for a commission of between 5% and 10%.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Police claim this is set up through fictitious companies, including one American firm named World Transfer, although the mules could be unaware that their computers are being used for theft.<\/p>\n<p>A dozen Russian thieves, described by police as being typically aged between 20 and 30, and several Ukrainian masterminds of the scam have been arrested in Moscow and St Petersburg.  The authorities were alerted in November 2004, when a bank customer noticed a large sum missing from his account.<\/p>\n<p>Nicolas Woirhaye, a security expert, said the French authorities were alerted to scams every three weeks.  &#8220;All the French victims were trapped because they didn&#8217;t have any [computer] protection,&#8221; he said.<\/p>\n<p>http:\/\/www.guardian.co.uk\/france\/story\/0,,1703777,00.html#article_continue<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-728","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=728"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/728\/revisions"}],"predecessor-version":[{"id":3215,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/728\/revisions\/3215"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}